• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The potential risks that are involved when organisations implant a new IT system are

Extracts from this document...

Introduction

Q1 The potential risks that are involved when organisations implant a new IT system are electric shock, loss of data, compatibility issues, loss of services, security and computer crashes. The company can offset the potential risks involved in implementing new information technology by having electrical equipments tested by an election, backing up all electronic data and store backups in a fireproof safe. Having a contingency plan in place helps business, governments and councils in case of something going wrong then it can help to recover from serious incidents reducing the time spent on resolving the issues or problems with minimum costs and disruptions. Employing IT Specialist to be on hand encase of an emergency, will also pick the company back up. High level security measures both electronically and physically can help prevent and mishaps and systems loss of data. ...read more.

Middle

Existing employees could have their work pattern disrupted by the amount of work load could increase, and for some lucky employees decrease. There could be a change of role so some employees will need retraining, this may not be down to qualification, but adapting to the new surroundings and new systems. Some employees will have longer hours or have to work nights; this could lead to strain on social life and most properly home life. Employees may need to change location; this again has a huge stress especially employees who have families and young children who are in the most important time in their education, employees will not want to travel miles every day to get to and from work, so some employees may resign or even not go into work and then the organisation will have to pay more to employee more staff, however the organisation will be paying for employees travel expenses. ...read more.

Conclusion

The benefits of using this software are that it changes in market and the business is alerted immediately. There are also special tools to help others to understand the market. Decision support software helps with the decisions using raw data and personal knowledge and also documents. The main factors of DSS are that it compares the weekly sales on a weekly basis. It views the projectective revenue (which plays an important part in any business) the business may achieve on the basis of sales. This really useful software helps any business it increases organisational control over threats and files Q4) Assess the short term and long term effects on the council as a result of implementing the IT changes Development Short Term Long term Comment Website Easy access for customers and clients. Easy access to information ?? ?? ?? ?? Craig Waters Task 3 - Risks 1 OF 2 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    * Product details are currently included in a small booklet that is available at the front desk of the store. This information detailing products will be entered into the new computer system. * Outputs from the system can be viewed in two different ways: * On screen (a soft copy)

  2. Analysis Tools

    Each data flow may be referenced by the processes or data stores at its head and tail, or by a description of its contents, customer details to customer inventory. Fig. 1 An example of a data flow diagram. It also focuses on the processes that transform incoming data flows (inputs)

  1. Role of different departments at Bedrooms4U, personnel involved. Main processes carried out by Bedrooms4U,inputs, ...

    Public, hotels, House builders Customer details, order requirements, size, measurements Final design and quotation. Face to face Companys that supply; - Wardrobes and cuboards - Handles - Coth rails curtains carpets etc Quantity, size colour measurements and product description. Face to face Face to Face email post Post Types of

  2. ICT Spreadsheet System

    system, but in the long run it the solution will be reduction of the costs of the business itself. The end-user will want to save money as they will want make as much profit as possible. The user will want to cut down time consuming, so this system will perfect

  1. Free essay

    ICT organisation project

    * Include the council's logo * The header will include the council's motto "Building the future together along with the council's website www.wigan.gov.uk Page 3 * Black WordArt title that continues on to page 4, "The drinking habit with" * Two text boxes used with Times New Roman font, including

  2. Explain the security risks and protection mechanisms involved in website performance.

    One way is to use Firewalls. A firewall is a network security system that acts as a barrier to protect the system from unauthorised access.

  1. Explain the potential risks to an organisation of committing to an e-commerce system

    Viruses could shut down a business?s due to the malicious harm it does which means the businesses wouldn?t be able to survive.

  2. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    There are several ways in which this could be achieved. Phishing: This is done via the use of emails which impersonate a legitimate business to try and persuade or trick users into providing personal or company details such as PIN numbers, passwords and credit card details, this is a type of social engineering.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work